Skip to content
This repository was archived by the owner on Apr 13, 2026. It is now read-only.

montysecurity/C2-Tracker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

804 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

C2 Tracker

C2 Tracker is a free-to-use-community-driven IOC feed that uses Shodan and Censys searches to collect IP addresses of known malware/botnet/C2 infrastructure.

This Project has been Archived

This project has been archived. The text files in data/ have been removed and are no longer updated. The signatures in tracker.py are no longer updated.

This project can still be ran locally, see below.

Honorable Mentions

Many of the queries have been sourced from other CTI researchers:

Huge shoutout to them!

Thanks to BertJanCyber for creating the KQL query for ingesting this feed

And finally, thanks to Y_nexro for creating C2Live in order to visualize the data and the website version at c2tracker.com

Usage

The most recent collection will be stored in data/. The IPs are seperated by the name of the tool and there is an all.txt that contains all of the IPs. As it currently stands this feed updates weekly on Monday.

Ingestion/Alerting

  • If your SIEM/EDR/TIP has the ability to ingest data from a remote source than you can use the files in their raw text format. See BertJanCyber's KQL query above as an example
  • FortinetSIEM 7.2.0 added support for this intel feed - https://docs.fortinet.com/document/fortisiem/7.2.0/release-notes/553241/whats-new-in-7-2-0

Investigations/Historical Analysis

  • The repo, by its nature, has version control. This means you can search the history of the repo for when an IP was present in the results. I have used one of my other public tools, GitHub Repo OSINT Tool, for this purpose.
  • There is an OpenCTI connector for this project which can be found here - not recommended for production environments

What do I track?

Running Locally

If you want to host a private version, put your Shodan API key in an environment variable called SHODAN_API_KEY, and setup your Censys credentials in CENSYS_API_ID & CENSYS_API_SECRET

The censys() function is currently commented out / disabled. See tracker.py for details

python3 -m pip install -r requirements.txt
python3 tracker.py

Contributing

I encourage opening an issue/PR if you know of any additional Shodan/Censys searches for identifying adversary infrastructure. I will not set any hard guidelines around what can be submitted, just know, fidelity is paramount (high true/false positive ratio is the focus).

References

About

Live Feed of C2 servers, tools, and botnets

Topics

Resources

Stars

Watchers

Forks

Contributors